Quick Heal Patch Archives

Quick Heal Patch Archives

Quick Heal Patch Archives

Quick Heal Patch Archives

Toggle Menu

Stellar Introduces New-Age ‘Data Recovery’ Solutions to mark its 25th Anniversary

by PCQ BureauDecember 20, 2018

Stellar has announced the global launch of new versions of their four flagships ‘B2C’ software, Stellar Data Recovery for Windows, Mac, iPhone and Stellar Photo Recovery. The new suite …

Read More [shareaholic app="share_buttons" id="15671367"]

ManageEngine Strengthens Endpoint Security with Patch Management on Cloud

by PCQ BureauFebruary 6, 2018

 ManageEngine announced that it is strengthening its endpoint management offering by bringing Patch Manager Plus to the cloud. The automated patch management solution for Windows and third-party applications is available immediately.

Read More [shareaholic app="share_buttons" id="15671367"]

Acer Introduces India’s 1st Windows Mixed Reality Headset

by PCQ BureauDecember 11, 2017

Acer exhibited India’s 1st Mixed Reality headset at the Grand Finale event of its Predator league. This most recent innovation by Acer involves the power of virtual reality and astounding …

Read More [shareaholic app="share_buttons" id="15671367"]

Over 2.3 million infections detected on Windows in Q2

by Suksham SharmaAugust 3, 2017

Over 2.3 million infections and 13 families of ransomware were detected on Windows in the second quarter of 2017, a new report revealed recently. According to Quick Heal Technologies, malware detections saw a drop …

Read More [shareaholic app="share_buttons" id="15671367"]

Microsoft R Server 9.1 Now Generally Available within Azure HDInsight

by Raj Kumar MauryaJuly 12, 2017

Microsoft R Server 9.1 on Azure HDInsight is generally available. With this, it brings more power to the cloud on Spark 2.1 on HDInsight 3.6. This release of R Server on …

Read More [shareaholic app="share_buttons" id="15671367"]

Quick Heal detected millions of malware samples on Windows and on Android platform in Q1 2017

by Mayank ShishodiaMay 8, 2017

According to Quick Heal Threat Report for Q1 2017, about 295 million malware samples were blocked on the systems of Quick Heal users. February clocked the highest number of detection. …

Read More [shareaholic app="share_buttons" id="15671367"]

Microsoft updates Windows 10 IoT Core

by Raj Kumar MauryaAugust 9, 2016

Windows 10 IoT Core is the version of Windows 10 intended for development of embedded or dedicated purpose devices and the choice for the Maker community. This package contains the …

Read More [shareaholic app="share_buttons" id="15671367"]

The Future of VR is Here: Holographic on Windows 10 Now

by Raj Kumar MauryaJune 2, 2016

Microsoft released some exciting news about Windows Holographic – the platform is now included with Windows 10 to empowers the amazing mixed reality experiences available on Microsoft HoloLens. Starting soon, Windows …

Read More [shareaholic app="share_buttons" id="15671367"]

Going Back to Windows 7/8.1

by Raj Kumar MauryaJanuary 13, 2016

Before you begin, here’s a word of caution: This downgrade will not affect your PC files but to be on the safer side make sure to backup your important files. …

Read More [shareaholic app="share_buttons" id="15671367"]

Solving Linux Dual Boot Problems With Windows 10

by Raj Kumar MauryaDecember 2, 2015

If you just upgraded to Windows 10 from Windows 8.1 or Windows 7 and also have a partition with Ubuntu installed, then Grub will no longer appear on the boot …

Read More [shareaholic app="share_buttons" id="15671367"]

Tweak your Windows 10 Taskbar

by Raj Kumar MauryaOctober 9, 2015

You can pin useful tools to the Taskbar in Win10. We’ll illustrate by showing how to pin computer, recycle bin & other useful shortcuts in a few simple steps Starting from …

Read More [shareaholic app="share_buttons" id="15671367"]

Getting Hooked-Up on Windows 10: All you need to know

by Anuj SharmaOctober 1, 2015

Microsoft recently released Windows 10, which represents a strategic shift in how Windows is going to be marketed in future. It’s going to be the last big bang release of …

Read More [shareaholic app="share_buttons" id="15671367"]

Meet the New Windows 10 Store

by Rohit AroraSeptember 28, 2015

Windows 10 has introduced a new Windows Store, which is Microsoft’s attempt to unify the Windows 10 experience across all devices such as PCs, tablets and mobile phones. End users will …

Read More [shareaholic app="share_buttons" id="15671367"]

Fill your Apps gaps with the much awaited Windows 10

by Rashi VarshneySeptember 28, 2015

We all know that a smart device is nothing without apps. We all have apps for everything, from tracking our sleep patterns, to reminding you about having a glass of …

Read More [shareaholic app="share_buttons" id="15671367"]

What Security Features you would get with Windows 10?

by Ashok PandeySeptember 24, 2015

Windows 10 made a lot of noise across the globe even before they announced the technical preview. With lots of improvements, Microsoft added security in the new OS to secure …

Read More [shareaholic app="share_buttons" id="15671367"]

Is Your Hardware Compatible With Windows 10?

by Raj Kumar MauryaSeptember 14, 2015

Windows 10 upgrade is available for all existing windows 7 and Windows 8 machines as Microsoft announced that Windows 10 upgrade is a full version and the size …

Read More [shareaholic app="share_buttons" id="15671367"]

Can Windows 10 Change The Game For Microsoft?

by PCQ BureauJuly 27, 2015

The latest but the last operating system in Windows series, Windows 10 has lots of attractive features which had been missing in its earlier releases – …

Read More [shareaholic app="share_buttons" id="15671367"]

Now save damaged word files with Datanumen Word Repair 2.5

by Rashi VarshneyJuly 17, 2015

DataNumen has released DataNumen Word Repair version 2.5, a Windows application that repairs damaged files created by Microsoft Word and other word processors and text editors that create .DOC and …

Read More [shareaholic app="share_buttons" id="15671367"]

6 Free Download Managers For Windows

by Raj Kumar MauryaMay 14, 2015

Here are some of the best free Download Managers that will help you to download online content. These software provide you easy functionality with increased speed, the ability …

Read More [shareaholic app="share_buttons" id="15671367"]
Источник: [https://torrent-igruha.org/3551-portal.html]
, Quick Heal Patch Archives

quick heal scanning gives following results pl help to iomprove performance of laptop

Report for - Total Security Scanner

Sunday, 29 May, 2016, Time 13:16:59

Total Security Version - 16.00

Virus database - 28 May 2016

-------------------------------------------------------

Scanner Settings for this Scan were as follows.

- Scanning only executable files.

- Scan suspicious packed files is on.

- Scan packed files is on.

- Scan Mailbox is on.

- DNAScan is on.

- Archive file scanning is on for - ARJ, RAR, ZIP, SIS, MSExpand

- Respond when a virus is found:- Repair

- Respond when a virus is found in an archive file:- Skip

-------------------------------------------------------

C:\hiberfil.sys

File does not exist

C:\pagefile.sys

File does not exist

C:\Program Files\Quick Heal\Quick Heal Total Security\REPORT\MTR74659757000018AC.MTR

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\039b5a77cb863fa89788bb354d56c67e_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\1332cfa7741619b58ef0ed9bc1e6a01b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\168fb49efe8da0d0cdd12e106cf9adf3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\1c04f88029dd5a7e395a9d79b0b98991_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\2564c833e5e47e06d9575aa8d959acd7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\3445783a3ce6df2e03419746f105783b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\3d1dcf825f9d38b2ff9777f00b617b19_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\458ace5ffba3bf3a5b7da4c0d68ad4dc_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\47e66056ad181810540b833beec7bef7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\528b21403d42c8ae22c40d0876880ecf_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\593c5d0bd7765eeb3e0c74777b0a139a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\5b9ffb689d45b88d933f5af466491c9d_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\636b42cdd730031f7f93caa798b08b43_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\653b425fbe12066977885a782bd042b8_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\66c78c4172077b151cb8d7f53bfaacd0_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\703d5833f1d68968a5f3c41a2c5a3833_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\72a7c9a5df541761a3c24355c671a4c0_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\7ef0e1f1838e559156ac1bfe4bdb468a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\80d293826b7788da048836f680563f58_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\88ee1409392d650fd2df3516c098258e_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\8b7db3de4b3524f02a243b85f63b0f06_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\8f42bf39d42a0dfa617617e7aa2cd0e3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\9185ddbc682af60d72946da863253ef7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\96190ff4519ccf06f632f839a48a2f51_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\962fca38194ce931493250eff44b6a00_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\bf119946eda91525bcbd6d953070a10a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\c205bcfce4fd289e8191cfdb3d70596b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\c2b2801d114a01d7e0ed6824d77a1cf3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\c5d72637b1eed7068a845708554d8935_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\cdd698f776b06eea4e9c0efaf8b8c090_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\d9d4ab9d3f4f085959d9c40abe016b9a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\def7c327fa9eff0291e4cc346e14ef1a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\e498507382542f200cf909f2ce67fa4b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\ea4166eae020158b152f3b2340e57a63_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\ProgramData\Microsoft\Diagnosis\DownloadedSettings\telemetry.ASM-WindowsDefault.json

Access is denied

C:\ProgramData\Microsoft\Diagnosis\DownloadedSettings\utc.app.json

Access is denied

C:\ProgramData\Microsoft\Search\Data\Applications\Windows\edb.log

Access is denied

C:\ProgramData\Microsoft\Search\Data\Applications\Windows\edbtmp.log

Access is denied

C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb

Access is denied

C:\ProgramData\Microsoft\Windows Defender\Scans\History\CacheManager\MpScanCache-1.bin

Access is denied

C:\swapfile.sys

File does not exist

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\039b5a77cb863fa89788bb354d56c67e_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\1332cfa7741619b58ef0ed9bc1e6a01b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\168fb49efe8da0d0cdd12e106cf9adf3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\1c04f88029dd5a7e395a9d79b0b98991_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\2564c833e5e47e06d9575aa8d959acd7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\3445783a3ce6df2e03419746f105783b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\3d1dcf825f9d38b2ff9777f00b617b19_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\458ace5ffba3bf3a5b7da4c0d68ad4dc_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\47e66056ad181810540b833beec7bef7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\528b21403d42c8ae22c40d0876880ecf_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\593c5d0bd7765eeb3e0c74777b0a139a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\5b9ffb689d45b88d933f5af466491c9d_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\636b42cdd730031f7f93caa798b08b43_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\653b425fbe12066977885a782bd042b8_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\66c78c4172077b151cb8d7f53bfaacd0_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\703d5833f1d68968a5f3c41a2c5a3833_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\72a7c9a5df541761a3c24355c671a4c0_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\7ef0e1f1838e559156ac1bfe4bdb468a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\80d293826b7788da048836f680563f58_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\88ee1409392d650fd2df3516c098258e_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\8b7db3de4b3524f02a243b85f63b0f06_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\8f42bf39d42a0dfa617617e7aa2cd0e3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\9185ddbc682af60d72946da863253ef7_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\96190ff4519ccf06f632f839a48a2f51_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\962fca38194ce931493250eff44b6a00_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\bf119946eda91525bcbd6d953070a10a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\c205bcfce4fd289e8191cfdb3d70596b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\c2b2801d114a01d7e0ed6824d77a1cf3_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\c5d72637b1eed7068a845708554d8935_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\cdd698f776b06eea4e9c0efaf8b8c090_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\d9d4ab9d3f4f085959d9c40abe016b9a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\def7c327fa9eff0291e4cc346e14ef1a_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\e498507382542f200cf909f2ce67fa4b_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\ea4166eae020158b152f3b2340e57a63_b99c3a52-21b3-43a6-a620-1fc04b1edba4

Access is denied

C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\telemetry.ASM-WindowsDefault.json

Access is denied

C:\Users\All Users\Microsoft\Diagnosis\DownloadedSettings\utc.app.json

Access is denied

C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\edb.log

Access is denied

C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\edbtmp.log

Access is denied

C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Windows.edb

Access is denied

C:\Users\All Users\Microsoft\Windows Defender\Scans\History\CacheManager\MpScanCache-1.bin

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\Notifications\WPNPRMRY.tmp

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\UsrClass.dat

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\WebCache\V01.log

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat

Access is denied

C:\Users\hp\AppData\Local\Microsoft\Windows\WebCacheLock.dat

Access is denied

C:\Users\hp\NTUSER.DAT

Access is denied

C:\Users\hp\ntuser.dat.LOG1

Access is denied

C:\Users\hp\ntuser.dat.LOG2

Access is denied

C:\Users\hp\Softwares\Internet Download Manager v6.08 Beta + Crack (Srkfan-Invicta RG)\IDM V.K{HKRG}.rar/Keygen+Patch\Keygen+Patch.rar/Patch.exe

Detected: "EE:Malwr.Heur.Application.Graftor.187760"

File is skipped

C:\Users\hp\Softwares\Internet Download Manager v6.08 Beta + Crack (Srkfan-Invicta RG)\IDM V.K{HKRG}.rar

File is skipped

C:\Users\hp\Softwares\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Only Service\Service_KMS.exe

Detected: "EE:Malware.GenericKD.3045218"

File is skipped

C:\Users\hp\Softwares\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Portable\AutoPico.exe

Detected: "EE:Malware.GenericKD.3045225"

File is skipped

C:\Users\hp\Softwares\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KeyGen.exe/AutoIt_Script

Detected: "Trojan.AutoIt.Blocker.A"

File is skipped

C:\Users\hp\Softwares\office_-2007\KMSpico 8 Final Windows activater(malestom).rar

File is skipped

C:\Windows\AppCompat\Programs\Amcache.hve

Access is denied

C:\Windows\AppCompat\Programs\Amcache.hve.LOG1

Access is denied

C:\Windows\AppCompat\Programs\Amcache.hve.LOG2

Access is denied

C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT

Access is denied

C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.LOG1

Access is denied

C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT.LOG2

Access is denied

C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT

Access is denied

C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.LOG1

Access is denied

C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT.LOG2

Access is denied

C:\Windows\System32\catroot2\edb.log

Access is denied

C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb

Access is denied

C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb

Access is denied

C:\Windows\System32\config\BBI

Access is denied

C:\Windows\System32\config\BBI.LOG1

Access is denied

C:\Windows\System32\config\BBI.LOG2

Access is denied

C:\Windows\System32\config\DEFAULT

Access is denied

C:\Windows\System32\config\DEFAULT.LOG1

Access is denied

C:\Windows\System32\config\DEFAULT.LOG2

Access is denied

C:\Windows\System32\config\RegBack\DEFAULT

Access is denied

C:\Windows\System32\config\RegBack\SAM

Access is denied

C:\Windows\System32\config\RegBack\SECURITY

Access is denied

C:\Windows\System32\config\RegBack\SOFTWARE

Access is denied

C:\Windows\System32\config\RegBack\SYSTEM

Access is denied

C:\Windows\System32\config\SAM

Access is denied

C:\Windows\System32\config\SAM.LOG1

Access is denied

C:\Windows\System32\config\SAM.LOG2

Access is denied

C:\Windows\System32\config\SECURITY

Access is denied

C:\Windows\System32\config\SECURITY.LOG1

Access is denied

C:\Windows\System32\config\SECURITY.LOG2

Access is denied

C:\Windows\System32\config\SOFTWARE

Access is denied

C:\Windows\System32\config\SOFTWARE.LOG1

Access is denied

C:\Windows\System32\config\SOFTWARE.LOG2

Access is denied

C:\Windows\System32\config\SYSTEM

Access is denied

C:\Windows\System32\config\SYSTEM.LOG1

Access is denied

C:\Windows\System32\config\SYSTEM.LOG2

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat.LOG1

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat.LOG2

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat{c4f60432-b15f-11e5-825f-142d27dbe37c}.TM.blf

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat{c4f60432-b15f-11e5-825f-142d27dbe37c}.TMContainer00000000000000000001.regtrans-ms

Access is denied

C:\Windows\System32\Microsoft\Protect\Recovery\Recovery.dat{c4f60432-b15f-11e5-825f-142d27dbe37c}.TMContainer00000000000000000002.regtrans-ms

Access is denied

C:\Windows\System32\sru\SRU.log

Access is denied

C:\Windows\System32\sru\SRUDB.dat

Access is denied

C:\Windows\System32\sru\SRUtmp.log

Access is denied

D:\Disk D\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Only Service\Service_KMS.exe

Detected: "EE:Malware.GenericKD.3045218"

File is skipped

D:\Disk D\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Portable\AutoPico.exe

Detected: "EE:Malware.GenericKD.3045225"

File is skipped

D:\Disk D\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KeyGen.exe/AutoIt_Script

Detected: "Trojan.AutoIt.Blocker.A"

File is skipped

D:\Disk D\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar

File is skipped

D:\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Only Service\Service_KMS.exe

Detected: "EE:Malware.GenericKD.3045218"

File is skipped

D:\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KMSpico 8 Final Windows activater(malestom)\kmspico 8\KMSpico Portable\AutoPico.exe

Detected: "EE:Malware.GenericKD.3045225"

File is skipped

D:\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar/KeyGen.exe/AutoIt_Script

Detected: "Trojan.AutoIt.Blocker.A"

File is skipped

D:\New folder\office_-2007\KMSpico 8 Final Windows activater(malestom).rar

File is skipped

F:\LIC Policy details\~$LIC Policy details.xlsx

Access is denied

No files found on the drive <H:\>

-------------------------------------------------------

Scan started at:13:16:59

Scan finished at:15:04:22

Boot/Partition viruses - 0

Files scanned - 457573

Files quarantined - 0

Files deleted - 0

I/O errors - 136

Threats detected - 10

Files repaired - 0

Archive/Packed - 8581

DNAScan warnings - 0

This thread is locked. You can follow the question or vote as helpful, but you cannot reply to this thread.
  • Subscribe
  • Subscribe to RSS feed
Источник: [https://torrent-igruha.org/3551-portal.html]
Quick Heal Patch Archives
NameDescriptionCVE-2020-9399The Avast AV parsing engine allows virus-detection bypass via a crafted ZIP archive. This affects versions before 12 definitions 200114-0 of Antivirus Pro, Antivirus Pro Plus, and Antivirus for Linux. CVE-2020-9362The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android. CVE-2020-9320Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK. CVE-2020-9264ESET Archive Support Module before 1296 allows virus-detection bypass via a crafted Compression Information Field in a ZIP archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop. CVE-2020-8961An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injection can be used to turn off this feature. After that, one can construct an event that will modify a file at a specific location, and pass this event to the driver, thereby defeating the anti-virus functionality. CVE-2020-8103A vulnerability in the improper handling of symbolic links in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects Bitdefender Antivirus Free versions prior to 1.0.17.178. CVE-2020-8099A vulnerability in the improper handling of junctions in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects: Bitdefender Antivirus Free versions prior to 1.0.17. CVE-2020-8093A vulnerability in the AntivirusforMac binary as used in Bitdefender Antivirus for Mac allows an attacker to inject a library using DYLD environment variable to cause third-party code execution CVE-2020-8092A privilege escalation vulnerability in BDLDaemon as used in Bitdefender Antivirus for Mac allows a local attacker to obtain authentication tokens for requests submitted to the Bitdefender Cloud. This issue affects: Bitdefender Bitdefender Antivirus for Mac versions prior to 8.0.0. CVE-2020-6013ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems. CVE-2020-3481A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-3350A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working. CVE-2020-3341A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-3327A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-3123A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. CVE-2020-15024An issue was discovered in the Login Password feature of the Password Manager component in Avast Antivirus 20.1.5069.562. An entered password continues to be stored in Windows main memory after a logout, and after a Lock Vault operation. CVE-2020-14955In Jiangmin Antivirus 16.0.13.129, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220440. CVE-2020-13657An elevation of privilege vulnerability exists in Avast Free Antivirus and AVG AntiVirus Free before 20.4 due to improperly handling hard links. The vulnerability allows local users to take control of arbitrary files. CVE-2020-12680** DISPUTED ** Avira Free Antivirus through 15.0.2005.1866 allows local users to discover user credentials. The functions of the executable file Avira.PWM.NativeMessaging.exe are aimed at collecting credentials stored in Chrome, Firefox, Opera, and Edge. The executable does not verify the calling program and thus a request such as fetchChromePasswords or fetchCredentials will succeed. NOTE: some third parties have stated that this is "not a vulnerability." CVE-2020-12254Avira Antivirus before 5.0.2003.1821 on Windows allows privilege escalation or a denial of service via abuse of a symlink. CVE-2020-11446ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation. CVE-2020-10868An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to launch the Repair App RPC call from a Low Integrity process. CVE-2020-10867An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to bypass intended access restrictions on tasks from an untrusted process, when Self Defense is enabled. CVE-2020-10866An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC. CVE-2020-10865An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to make arbitrary changes to the Components section of the Stats.ini file via RPC from a Low Integrity process. CVE-2020-10864An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a reboot via RPC from a Low Integrity process. CVE-2020-10863An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to trigger a shutdown via RPC from a Low Integrity process via TempShutDownMachine. CVE-2020-10862An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC. CVE-2020-10861An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled. CVE-2020-10860An issue was discovered in Avast Antivirus before 20. An Arbitrary Memory Address Overwrite vulnerability in the aswAvLog Log Library results in Denial of Service of the Avast Service (AvastSvc.exe). CVE-2020-10193ESET Archive Support Module before 1294 allows virus-detection bypass via crafted RAR Compression Information in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop. CVE-2020-10180The ESET AV parsing engine allows virus-detection bypass via a crafted BZ2 Checksum field in an archive. This affects versions before 1294 of Smart Security Premium, Internet Security, NOD32 Antivirus, Cyber Security Pro (macOS), Cyber Security (macOS), Mobile Security for Android, Smart TV Security, and NOD32 Antivirus 4 for Linux Desktop. CVE-2019-8285Kaspersky Lab Antivirus Engine version before 04.apr.2019 has a heap-based buffer overflow vulnerability that potentially allow arbitrary code execution CVE-2019-3973Comodo Antivirus versions 11.0.0.6582 and below are vulnerable to Denial of Service affecting CmdGuard.sys via its filter port "cmdServicePort". A low privileged process can crash CmdVirth.exe to decrease the port's connection count followed by process hollowing a CmdVirth.exe instance with malicious code to obtain a handle to "cmdServicePort". Once this occurs, a specially crafted message can be sent to "cmdServicePort" using "FilterSendMessage" API. This can trigger an out-of-bounds write if lpOutBuffer parameter in FilterSendMessage API is near the end of specified buffer bounds. The crash occurs when the driver performs a memset operation which uses a size beyond the size of buffer specified, causing kernel crash. CVE-2019-3972Comodo Antivirus versions 12.0.0.6810 and below are vulnerable to Denial of Service affecting CmdAgent.exe via an unprotected section object "<GUID>_CisSharedMemBuff". This section object is exposed by CmdAgent and contains a SharedMemoryDictionary object, which allows a low privileged process to modify the object data causing CmdAgent.exe to crash. CVE-2019-3971Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to a local Denial of Service affecting CmdVirth.exe via its LPC port "cmdvrtLPCServerPort". A low privileged local process can connect to this port and send an LPC_DATAGRAM, which triggers an Access Violation due to hardcoded NULLs used for Source parameter in a memcpy operation that is called for this handler. This results in CmdVirth.exe and its child svchost.exe instances to terminate. CVE-2019-3970Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to Arbitrary File Write due to Cavwp.exe handling of Comodo's Antivirus database. Cavwp.exe loads Comodo antivirus definition database in unsecured global section objects, allowing a local low privileged process to modify this data directly and change virus signatures. CVE-2019-3969Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to Local Privilege Escalation due to CmdAgent's handling of COM clients. A local process can bypass the signature check enforced by CmdAgent via process hollowing which can then allow the process to invoke sensitive COM methods in CmdAgent such as writing to the registry with SYSTEM privileges. CVE-2019-3646DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights. CVE-2019-19695A privilege escalation vulnerability in Trend Micro Antivirus for Mac 2019 (v9.0.1379 and below) could potentially allow an attacker to create a symbolic link to a target file and modify it. CVE-2019-18979Adaware antivirus 12.6.1005.11662 and 12.7.1055.0 has a quarantine flaw that allows privilege escalation. Exploitation uses an NTFS directory junction to restore a malicious DLL from quarantine into the system32 folder. CVE-2019-18895Scanguard through 2019-11-12 on Windows has Insecure Permissions for the installation directory, leading to privilege escalation via a Trojan horse executable file. CVE-2019-18894In Avast Premium Security 19.8.2393, attackers can send a specially crafted request to the local web server run by Avast Antivirus on port 27275 to support Bank Mode functionality. A flaw in the processing of a command allows execution of arbitrary OS commands with the privileges of the currently logged in user. This allows for example attackers who compromised a browser extension to escape from the browser sandbox. CVE-2019-18654A Cross Site Scripting (XSS) issue exists in AVG AntiVirus (Internet Security Edition) 19.3.3084 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name. CVE-2019-18653A Cross Site Scripting (XSS) issue exists in Avast AntiVirus (Free, Internet Security, and Premiere Edition) 19.3.2369 build 19.3.4241.440 in the Network Notification Popup, allowing an attacker to execute JavaScript code via an SSID Name. CVE-2019-18568Avira Free Antivirus 15.0.1907.1514 is prone to a local privilege escalation through the execution of kernel code from a restricted user. CVE-2019-1798A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device. CVE-2019-1788A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device. CVE-2019-1787A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device. CVE-2019-1786A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device. CVE-2019-1785A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system. CVE-2019-17093An issue was discovered in Avast antivirus before 19.8 and AVG antivirus before 19.8. A DLL Preloading vulnerability allows an attacker to implant %WINDIR%\system32\wbemcomn.dll, which is loaded into a protected-light process (PPL) and might bypass some of the self-defense mechanisms. This affects all components that use WMI, e.g., AVGSvc.exe 19.6.4546.0 and TuneupSmartScan.dll 19.1.884.0. CVE-2019-16913PC Protect Antivirus v4.14.31 installs by default to %PROGRAMFILES(X86)%\PCProtect with very weak folder permissions, granting any user full permission "Everyone: (F)" to the contents of the directory and its subfolders. In addition, the program installs a service called SecurityService that runs as LocalSystem. This allows any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a Trojan horse. CVE-2019-16897In K7 Antivirus Premium 16.0.xxx through 16.0.0120; K7 Total Security 16.0.xxx through 16.0.0120; and K7 Ultimate Security 16.0.xxx through 16.0.0120, the module K7TSHlpr.dll improperly validates the administrative privileges of the user, allowing arbitrary registry writes in the K7AVOptn.dll module to facilitate escalation of privileges via inter-process communication with a service process. CVE-2019-15961A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition. CVE-2019-15295An Untrusted Search Path vulnerability in the ServiceInstance.dll library versions 1.0.15.119 and lower, as used in Bitdefender Antivirus Free 2020 versions prior to 1.0.15.138, allows an attacker to load an arbitrary DLL file from the search path. CVE-2019-14694A use-after-free flaw in the sandbox container implemented in cmdguard.sys in Comodo Antivirus 12.0.0.6870 can be triggered due to a race condition when handling IRP_MJ_CLEANUP requests in the minifilter for directory change notifications. This allows an attacker to cause a denial of service (BSOD) when an executable is run inside the container. CVE-2019-14270Comodo Antivirus through 12.0.0.6870, Comodo Firewall through 12.0.0.6870, and Comodo Internet Security Premium through 12.0.0.6870, with the Comodo Container feature, are vulnerable to Sandbox Escape. CVE-2019-14242An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges. CVE-2019-12042Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory and the event Global\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security. CVE-2019-11230In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart. CVE-2018-8090Quick Heal Total Security 64 bit 17.00 (QHTS64.exe), (QHTSFT64.exe) - Version 10.0.1.38; Quick Heal Total Security 32 bit 17.00 (QHTS32.exe), (QHTSFT32.exe) - Version 10.0.1.38; Quick Heal Internet Security 64 bit 17.00 (QHIS64.exe), (QHISFT64.exe) - Version 10.0.0.37; Quick Heal Internet Security 32 bit 17.00 (QHIS32.exe), (QHISFT32.exe) - Version 10.0.0.37; Quick Heal AntiVirus Pro 64 bit 17.00 (QHAV64.exe), (QHAVFT64.exe) - Version 10.0.0.37; and Quick Heal AntiVirus Pro 32 bit 17.00 (QHAV32.exe), (QHAVFT32.exe) - Version 10.0.0.37 allow DLL Hijacking because of Insecure Library Loading. CVE-2018-6788In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x2208C0. CVE-2018-6787In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x221808. CVE-2018-6786In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220840. CVE-2018-6785In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008254. CVE-2018-6784In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A00824C. CVE-2018-6783In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A00825C. CVE-2018-6782In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A0081DC. CVE-2018-6781In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008264. CVE-2018-6780In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A0081E4. CVE-2018-6779In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008240. CVE-2018-6778In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008268. CVE-2018-6777In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220400. CVE-2018-6776In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A00813C. CVE-2018-6775In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x990081C8. CVE-2018-6774In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008088. CVE-2018-6773In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008084. CVE-2018-6772In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008208. CVE-2018-6771In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008224. CVE-2018-6770In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008210. CVE-2018-6769In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008020. CVE-2018-6768In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008090. CVE-2018-6203In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300210C. CVE-2018-6202In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020F8. CVE-2018-6201In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020E0 or 0x830020E4. CVE-2018-5958In Zillya! Antivirus 3.0.2230.0, the driver file (zef.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402424. CVE-2018-5957In Zillya! Antivirus 3.0.2230.0, the driver file (zef.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C40242C. CVE-2018-5956In Zillya! Antivirus 3.0.2230.0, the driver file (zef.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402414. CVE-2018-5701In Iolo System Shield AntiVirus and AntiSpyware 5.0.0.136, the amp.sys driver file contains an Arbitrary Write vulnerability due to not validating input values from IOCtl 0x00226003. CVE-2018-5220In K7 Antivirus 15.1.0306, the driver file (K7Sentry.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x95002610. CVE-2018-5219In K7 Antivirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002168. CVE-2018-5218In K7 Antivirus 15.1.0306, the driver file (K7Sentry.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x950025b0. CVE-2018-5217In K7 Antivirus 15.1.0306, the driver file (K7Sentry.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x95002578. CVE-2018-5088In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300211C. CVE-2018-5087In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002100. CVE-2018-5086In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300215F. CVE-2018-5085In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002124. CVE-2018-5084In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300212C. CVE-2018-5083In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300215B. CVE-2018-5082In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002128. CVE-2018-5081In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020F0. CVE-2018-5080In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020FC. CVE-2018-5079In K7 AntiVirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002130. CVE-2018-1999018Pydio version 8.2.1 and prior contains an Unvalidated user input leading to Remote Code Execution (RCE) vulnerability in plugins/action.antivirus/AntivirusScanner.php: Line 124, scanNow($nodeObject) that can result in An attacker gaining admin access and can then execute arbitrary commands on the underlying OS. This attack appear to be exploitable via The attacker edits the Antivirus Command in the antivirus plugin, and executes the payload by uploading any file within Pydio. CVE-2018-18329A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. CVE-2018-18328A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. CVE-2018-18327A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. CVE-2018-15367A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. CVE-2018-15366A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. CVE-2018-12572Avast Free Antivirus prior to 19.1.2360 stores user credentials in memory upon login, which allows local users to obtain sensitive information by dumping AvastUI.exe application memory and parsing the data. CVE-2018-12239Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected. CVE-2018-12238Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected. CVE-2018-1189Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Antivirus Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website. CVE-2018-10092The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads. CVE-2018-0649Untrusted search path vulnerability in the installers of multiple Canon IT Solutions Inc. software programs (ESET Smart Security Premium, ESET Internet Security, ESET Smart Security, ESET NOD32 Antivirus, DESlock+ Pro, and CompuSec (all programs except packaged ones)) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. CVE-2017-9977AVG AntiVirus for MacOS with scan engine before 4668 might allow remote attackers to bypass malware detection by leveraging failure to scan inside disk image (aka DMG) files. CVE-2017-8776Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 have approximately 165 PE files in the default installation that do not use ASLR/DEP protection mechanisms that provide sufficient defense against directed attacks against the product. CVE-2017-8775Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Memory Corruption while parsing a malformed Mach-O file. CVE-2017-8774Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Memory Corruption while parsing a malformed Mach-O file. CVE-2017-8773Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10.1.0.316, and Quick Heal AntiVirus Pro 10.1.0.316 are vulnerable to Out of Bounds Write on a Heap Buffer due to improper validation of dwCompressionSize of Microsoft WIM Header WIMHEADER_V1_PACKED. This vulnerability can be exploited to gain Remote Code Execution as well as Privilege Escalation. CVE-2017-8339PSKMAD.sys in Panda Free Antivirus 18.0 allows local users to cause a denial of service (BSoD) via a crafted DeviceIoControl request to \\.\PSMEMDriver. CVE-2017-8308In Avast Antivirus before v17, an unprivileged user (and thus malware or a virus) can mark an arbitrary process as Trusted from the perspective of the Avast product. This bypasses the Self-Defense feature of the product, opening a door to subsequent attack on many of its components. CVE-2017-8307In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack. CVE-2017-6186Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. CVE-2017-5567Code injection vulnerability in Avast Premier 12.3 (and earlier), Internet Security 12.3 (and earlier), Pro Antivirus 12.3 (and earlier), and Free Antivirus 12.3 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Avast process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. CVE-2017-5566Code injection vulnerability in AVG Ultimate 17.1 (and earlier), AVG Internet Security 17.1 (and earlier), and AVG AntiVirus FREE 17.1 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any AVG process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. CVE-2017-5565Code injection vulnerability in Trend Micro Maximum Security 11.0 (and earlier), Internet Security 11.0 (and earlier), and Antivirus+ Security 11.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Trend Micro process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack. CVE-2017-5005Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earlier, Total Security 10.1.0.316 and earlier, and AntiVirus Pro 10.1.0.316 and earlier on OS X allows remote attackers to execute arbitrary code via a crafted LC_UNIXTHREAD.cmdsize field in a Mach-O file that is mishandled during a Security Scan (aka Custom Scan) operation. CVE-2017-17701K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x950025c8 DeviceIoControl request. CVE-2017-17700K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x950025a4 DeviceIoControl request. CVE-2017-17699K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x950025ac DeviceIoControl request. CVE-2017-17465K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x95002574 DeviceIoControl request. CVE-2017-17464K7Sentry.sys 15.1.0.59 in K7 Antivirus 15.1.0309 has a NULL pointer dereference via a 0x95002570 DeviceIoControl request. CVE-2017-17429In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL. CVE-2017-16557K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way. CVE-2017-16556In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations. CVE-2017-16555K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way. CVE-2017-16554K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls. CVE-2017-16553K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way. CVE-2017-16552K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls. CVE-2017-16551K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way. CVE-2017-16550K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls. CVE-2017-16549K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls. CVE-2017-13108DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key. CVE-2017-13105Hi Security Virus Cleaner - Antivirus, Booster, 3.7.1.1329, 2017-09-13, Android application accepts all SSL certificates during SSL communication. This opens the application up to a man-in-the-middle attack having all of its encrypted traffic intercepted and read by an attacker. CVE-2017-12380ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition. CVE-2017-12379ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device. CVE-2017-12378ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device. CVE-2017-12377ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device. CVE-2017-12376ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code. CVE-2017-12375The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device. CVE-2017-12374The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition. CVE-2017-10706When Antiy Antivirus Engine before 5.0.0.05171547 scans a special ZIP archive, it crashes with a stack-based buffer overflow because a fixed path length is used. CVE-2017-10674Antiy Antivirus Engine 5.0.0.06281654 allows local users to cause a denial of service (BSOD) via a long third argument in a DeviceIoControl call. CVE-2016-9892The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate. NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root. CVE-2016-5311A Privilege Escalation vulnerability exists in Symantec Norton Antivirus, Norton AntiVirus with Backup, Norton Security, Norton Security with Backup, Norton Internet Security, Norton 360, Endpoint Protection Small Business Edition Cloud, and Endpoint Protection Cloud Client due to a DLL-preloading without path restrictions, which could let a local malicious user obtain system privileges. CVE-2016-5310The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (memory corruption) via a crafted RAR file that is mishandled during decompression. CVE-2016-5309The RAR file parser component in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection: Network (ATP); Symantec Email Security.Cloud; Symantec Data Center Security: Server; Symantec Endpoint Protection (SEP) for Windows before 12.1.6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1.6 MP6; Symantec Endpoint Protection for Small Business Enterprise (SEP SBE/SEP.Cloud); Symantec Endpoint Protection Cloud (SEPC) for Windows/Mac; Symantec Endpoint Protection Small Business Edition 12.1; CSAPI before 10.0.4 HF02; Symantec Protection Engine (SPE) before 7.0.5 HF02, 7.5.x before 7.5.4 HF02, 7.5.5 before 7.5.5 HF01, and 7.8.x before 7.8.0 HF03; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF2.1, 8.1.x before 8.1.2 HF2.3, and 8.1.3 before 8.1.3 HF2.2; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 6.5.8_3968140 HF2.3, 7.x before 7.0_3966002 HF2.1, and 7.5.x before 7.5_3966008 VHF2.2; Symantec Protection for SharePoint Servers (SPSS) before SPSS_6.0.3_To_6.0.5_HF_2.5 update, 6.0.6 before 6.0.6 HF_2.6, and 6.0.7 before 6.0.7_HF_2.7; Symantec Messaging Gateway (SMG) before 10.6.2; Symantec Messaging Gateway for Service Providers (SMG-SP) before 10.5 patch 260 and 10.6 before patch 259; Symantec Web Gateway; and Symantec Web Security.Cloud allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted RAR file that is mishandled during decompression. CVE-2016-4025Avast Internet Security v11.x.x, Pro Antivirus v11.x.x, Premier v11.x.x, Free Antivirus v11.x.x, Business Security v11.x.x, Endpoint Protection v8.x.x, Endpoint Protection Plus v8.x.x, Endpoint Protection Suite v8.x.x, Endpoint Protection Suite Plus v8.x.x, File Server Security v8.x.x, and Email Server Security v8.x.x allow attackers to bypass the DeepScreen feature via a DeviceIoControl call. CVE-2016-3984The McAfee VirusScan Console (mcconsol.exe) in McAfee Active Response (MAR) before 1.1.0.161, Agent (MA) 5.x before 5.0.2 Hotfix 1110392 (5.0.2.333), Data Exchange Layer 2.x (DXL) before 2.0.1.140.1, Data Loss Prevention Endpoint (DLPe) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Device Control (MDC) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Endpoint Security (ENS) 10.x before 10.1, Host Intrusion Prevention Service (IPS) 8.0 before 8.0.0.3624, and VirusScan Enterprise (VSE) 8.8 before P7 (8.8.0.1528) on Windows allows local administrators to bypass intended self-protection rules and disable the antivirus engine by modifying registry keys. CVE-2016-3646The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation) via a crafted ZIP archive that is mishandled during decompression. CVE-2016-3645Integer overflow in the TNEF unpacker in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to have an unspecified impact via crafted TNEF data. CVE-2016-3644The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via modified MIME data in a message. CVE-2016-2211The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted CAB file that is mishandled during decompression. CVE-2016-2210Buffer overflow in Dec2LHA.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code via a crafted file. CVE-2016-2209Buffer overflow in Dec2SS.dll in the AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code via a crafted file. CVE-2016-2208The kernel component in Symantec Anti-Virus Engine (AVE) 20151.1 before 20151.1.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation and system crash) via a malformed PE header file. CVE-2016-2207The AntiVirus Decomposer engine in Symantec Advanced Threat Protection (ATP); Symantec Data Center Security:Server (SDCS:S) 6.x through 6.6 MP1; Symantec Web Gateway; Symantec Endpoint Protection (SEP) before 12.1 RU6 MP5; Symantec Endpoint Protection (SEP) for Mac; Symantec Endpoint Protection (SEP) for Linux before 12.1 RU6 MP5; Symantec Protection Engine (SPE) before 7.0.5 HF01, 7.5.x before 7.5.3 HF03, 7.5.4 before HF01, and 7.8.0 before HF01; Symantec Protection for SharePoint Servers (SPSS) 6.0.3 through 6.0.5 before 6.0.5 HF 1.5 and 6.0.6 before HF 1.6; Symantec Mail Security for Microsoft Exchange (SMSMSE) before 7.0_3966002 HF1.1 and 7.5.x before 7.5_3966008 VHF1.2; Symantec Mail Security for Domino (SMSDOM) before 8.0.9 HF1.1 and 8.1.x before 8.1.3 HF1.2; CSAPI before 10.0.4 HF01; Symantec Message Gateway (SMG) before 10.6.1-4; Symantec Message Gateway for Service Providers (SMG-SP) 10.5 before patch 254 and 10.6 before patch 253; Norton AntiVirus, Norton Security, Norton Internet Security, and Norton 360 before NGC 22.7; Norton Security for Mac before 13.0.2; Norton Power Eraser (NPE) before 5.1; and Norton Bootable Removal Tool (NBRT) before 2016.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory access violation) via a crafted RAR file that is mishandled during decompression. CVE-2016-1405libclamav in ClamAV (aka Clam AntiVirus), as used in Advanced Malware Protection (AMP) on Cisco Email Security Appliance (ESA) devices before 9.7.0-125 and Web Security Appliance (WSA) devices before 9.0.1-135 and 9.1.x before 9.1.1-041, allows remote attackers to cause a denial of service (AMP process restart) via a crafted document, aka Bug IDs CSCuv78533 and CSCuw60503. CVE-2016-1372ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file. CVE-2016-1371ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable. CVE-2016-10402Avira Antivirus engine versions before 8.3.36.60 allow remote code execution as NT AUTHORITY\SYSTEM via a section header with a very large relative virtual address in a PE file, causing an integer overflow and heap-based buffer underflow. CVE-2016-0718Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. CVE-2015-8620Heap-based buffer overflow in the Avast virtualization driver (aswSnx.sys) in Avast Internet Security, Pro Antivirus, Premier, and Free Antivirus before 11.1.2253 allows local users to gain privileges via a Unicode file path in an IOCTL request. CVE-2015-7378Panda Security URL Filtering before 4.3.1.9 uses a weak ACL for the "Panda Security URL Filtering" directory and installed files, which allows local users to gain SYSTEM privileges by modifying Panda_URL_Filteringb.exe. CVE-2015-5737The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, (4) mdare64_52.sys, and (5) Fortishield.sys drivers in Fortinet FortiClient before 5.2.4 do not properly restrict access to the API for management of processes and the Windows registry, which allows local users to obtain a privileged handle to a PID and possibly have unspecified other impact, as demonstrated by a 0x2220c8 ioctl call. CVE-2015-5736The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call. CVE-2015-5735The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to write to arbitrary memory locations via a 0x226108 ioctl call. CVE-2015-5662Directory traversal vulnerability in Avast before 150918-0 allows remote attackers to delete or write to arbitrary files via a crafted entry in a ZIP archive. CVE-2015-4077The (1) mdare64_48.sys, (2) mdare32_48.sys, (3) mdare32_52.sys, and (4) mdare64_52.sys drivers in Fortinet FortiClient before 5.2.4 allow local users to read arbitrary kernel memory via a 0x22608C ioctl call.
Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the Quick Heal Patch Archives?

Screen Shot

System Requirements for Quick Heal Patch Archives

Add a Comment

Your email address will not be published. Required fields are marked *